IT-kurs
Nordland
Du har valgt: Narvik
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Narvik ) i IT-kurs
 

Nettkurs 40 minutter 5 600 kr
MoP®, er et rammeverk og en veiledning for styring av prosjekter og programmer i en portefølje. Sertifiseringen MoP Foundation gir deg en innføring i porteføljestyring me... [+]
Du vil få tilsendt en «Core guidance» bok og sertifiserings-voucher slik at du kan ta sertifiseringstesten for eksempel hjemme eller på jobb. Denne vil være gyldig i ett år. Tid for sertifiseringstest avtales som beskrevet i e-post med voucher. Eksamen overvåkes av en web-basert eksamensvakt.   Eksamen er på engelsk. Eksamensformen er multiple choice - 50 spørsmål skal besvares, og du består ved 50% korrekte svar (dvs 25 av 50 spørsmål). Deltakerne har 40 minutter til rådighet på eksamen.  Ingen hjelpemidler er tillatt.   Nødvendige forkunnskaper: Ingen [-]
Les mer
Virtuelt klasserom 3 dager 20 000 kr
In this course, the students will implement various data platform technologies into solutions that are in line with business and technical requirements including on-premi... [+]
The students will also explore how to implement data security including authentication, authorization, data policies and standards. They will also define and implement data solution monitoring for both the data storage and data processing activities. Finally, they will manage and troubleshoot Azure data solutions which includes the optimization and disaster recovery of big data, batch processing and streaming data solutions. Agenda Module 1: Azure for the Data Engineer -Explain the evolving world of data-Survey the services in the Azure Data Platform-Identify the tasks that are performed by a Data Engineer-Describe the use cases for the cloud in a Case Study Module 2: Working with Data Storage. -Choose a data storage approach in Azure-Create an Azure Storage Account-Explain Azure Data Lake storage-Upload data into Azure Data Lake Module 3: Enabling Team Based Data Science with Azure Databricks. -Explain Azure Databricks and Machine Learning Platforms-Describe the Team Data Science Process-Provision Azure Databricks and workspaces-Perform data preparation tasks Module 4: Building Globally Distributed Databases with Cosmos DB. -Create an Azure Cosmos DB database built to scale-Insert and query data in your Azure Cosmos DB database-Provision a .NET Core app for Cosmos DB in Visual Studio Code-Distribute your data globally with Azure Cosmos DB Module 5: Working with Relational Data Stores in the Cloud. -SQL Database and SQL Data Warehouse-Provision an Azure SQL database to store data-Provision and load data into Azure SQL Data Warehouse Module 6: Performing Real-Time Analytics with Stream Analytics. Module 7: Orchestrating Data Movement with Azure Data Factory. -Explain how Azure Data Factory works-Create Linked Services and datasets-Create pipelines and activities-Azure Data Factory pipeline execution and triggers Module 8: Securing Azure Data Platforms. -Configuring Network Security-Configuring Authentication-Configuring Authorization-Auditing Security Module 9: Monitoring and Troubleshooting Data Storage and Processing. -Data Engineering troubleshooting approach-Azure Monitoring Capabilities-Troubleshoot common data issues-Troubleshoot common data processing issues Module 10: Integrating and Optimizing Data Platforms. -Integrating data platforms-Optimizing data stores-Optimize streaming data-Manage disaster recovery [-]
Les mer
Virtuelt klasserom 4 timer 24 500 kr
This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data int... [+]
The course combines lecture with case studies to demonstrate basic architect design principles. Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. COURSE OBJECTIVES Skills gained Design a governance solution. Design a compute solution. Design an application architecture. COURSE CONTENT Module 1: Design compute and application solutions In this module you will learn about governance, compute, and application architectures. Lessons of Module 1 Design for governance Design for compute solutions Design for application architectures Lab : Case studies of Module 1 After completing this module, students will be able to: Design a governance solution. Design a compute solution. Design an application architecture. Module 2: Design storage solutions In this module, you will learn about non-relational storage, relational storage, and data integration solutions. Lessons of Module 2 Design a non-relational storage solution. Design a relational storage solution. Design a data integration solution. Lab : Case studies of Module 2 After completing this module, students will be able to: Design non-relational storage solutions. Design relational storage solutions. Design a data integration solution. Module 3: Design networking and access solutions In this module you will learn about authentication and authorization, identity and access for applications, and networking solutions. Lessons of Module 3 Design authentication and authorization solutions Design networking solutions Lab : Case studies of Module 3 After completing this module, students will be able to: Design authentication and authorization solutions. Design network solutions. Module 4: Design business continuity solutions Lessons of Module 4 Design for backup and disaster recovery Design monitoring solutions Design for migrations Lab : Case studies of Module 4 After completing this module, students will be able to: Design backup and disaster recovery. Design monitoring solutions. Design for migrations. [-]
Les mer
Virtuelt klasserom 3 dager 24 000 kr
The Developing on Amazon Web Services AWS course is designed to help individuals design and build secure, reliable and scalable AWS-based applications. [+]
COURSE OVERVIEW The Developing on Amazon Web Services AWS course is designed to help individuals design and build secure, reliable and scalable AWS-based applications. In this course, we cover fundamental concepts and baseline programming for developing applications on AWS. We also show you how to work with AWS code libraries, SDKs, and IDE toolkits so that you can effectively develop and deploy code on the AWS platform.   TARGET AUDIENCE This course is intended for Developers COURSE CONTENT Note: course outline may vary slightly based on the regional location and/or language in which the class is delivered. Day 1: Getting Started Working with the AWS code library, SDKs, and IDE toolkits Introduction to AWS security features Service object models and baseline concepts for working with Amazon Simple Storage Service (S3) and Amazon DynamoDB Day 2: Working with AWS Services Service object models and baseline concepts for working with the Amazon Simple Queue Service (SQS) and the Amazon Simple Notification Service (SNS) Applying AWS security features Day 3: Application Development and Deployment Best Practices Application deployment using AWS Elastic Beanstalk Best practices for working with AWS services   [-]
Les mer
Oslo 3 dager 20 900 kr
02 Oct
02 Oct
18 Dec
React: Hooks, Concurrency, Performance, Maintainability & Tests [+]
React: Hooks, Concurrency, Performance, Maintainability & Tests [-]
Les mer
Virtuelt klasserom 4 dager 20 000 kr
This four-day instructor-led course is designed for IT professionals who configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. [+]
COURSE OVERVIEW These professionals manage and support an infrastructure that includes on-premises and Azure IaaS-hosted Windows Server-based workloads. The course teaches IT professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to manage and secure Azure VMs running Windows Server. The course also covers how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights various administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. TARGET AUDIENCE This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. COURSE OBJECTIVES After you complete this course you will be able to: Harden the security configuration of the Windows Server operating system environment. Enhance hybrid security using Azure Security Center, Azure Sentinel, and Windows Update Management. Apply security features to protect critical resources. Implement high availability and disaster recovery solutions. Implement recovery services in hybrid scenarios. Plan and implement hybrid and cloud-only migration, backup, and recovery scenarios. Perform upgrades and migration related to AD DS, and storage. Manage and monitor hybrid scenarios using WAC, Azure Arc, Azure Automation and Azure Monitor. Implement service monitoring and performance monitoring, and apply troubleshooting. COURSE CONTENT Module 1: Windows Server security This module discusses how to protect an Active Directory environment by securing user accounts to least privilege and placing them in the Protected Users group. The module covers how to limit authentication scope and remediate potentially insecure accounts. The module also describes how to harden the security configuration of a Windows Server operating system environment. In addition, the module discusses the use of Windows Server Update Services to deploy operating system updates to computers on the network. Finally, the module covers how to secure Windows Server DNS to help protect the network name resolution infrastructure. Lessons for module 1 Secure Windows Sever user accounts Hardening Windows Server Windows Server Update Management Secure Windows Server DNS Lab : Configuring security in Windows Server Configuring Windows Defender Credential Guard Locating problematic accounts Implementing LAPS After completing module 1, students will be able to: Diagnose and remediate potential security vulnerabilities in Windows Server resources. Harden the security configuration of the Windows Server operating system environment. Deploy operating system updates to computers on a network by using Windows Server Update Services. Secure Windows Server DNS to help protect the network name resolution infrastructure. Implement DNS policies. Module 2: Implementing security solutions in hybrid scenarios This module describes how to secure on-premises Windows Server resources and Azure IaaS workloads. The module covers how to improve the network security for Windows Server infrastructure as a service (IaaS) virtual machines (VMs) and how to diagnose network security issues with those VMs. In addition, the module introduces Azure Security Center and explains how to onboard Windows Server computers to Security Center. The module also describes how to enable Azure Update Management, deploy updates, review an update assessment, and manage updates for Azure VMs. The modules explains how Adaptive application controls and BitLocker disk encryption are used to protect Windows Server IaaS VMs. Finally, the module explains how to monitor Windows Server Azure IaaS VMs for changes in files and the registry, as well as monitoring modifications made to application software. Lessons for module 2 Implement Windows Server IaaS VM network security. Audit the security of Windows Server IaaS Virtual Machines Manage Azure updates Create and implement application allowlists with adaptive application control Configure BitLocker disk encryption for Windows IaaS Virtual Machines Implement change tracking and file integrity monitoring for Windows Server IaaS VMs Lab : Using Azure Security Center in hybrid scenarios Provisioning Azure VMs running Windows Server Configuring Azure Security Center Onboarding on-premises Windows Server into Azure Security Center Verifying the hybrid capabilities of Azure Security Center Configuring Windows Server 2019 security in Azure VMs After completing module 2, students will be able to: Diagnose network security issues in Windows Server IaaS virtual machines. Onboard Windows Server computers to Azure Security Center. Deploy and manage updates for Azure VMs by enabling Azure Automation Update Management. Implement Adaptive application controls to protect Windows Server IaaS VMs. Configure Azure Disk Encryption for Windows IaaS virtual machines (VMs). Back up and recover encrypted data. Monitor Windows Server Azure IaaS VMs for changes in files and the registry. Module 3: Implementing high availability This module describes technologies and options to create a highly available Windows Server environment. The module introduces Clustered Shared Volumes for shared storage access across multiple cluster nodes. The module also highlights failover clustering, stretch clusters, and cluster sets for implementing high availability of Windows Server workloads. The module then discusses high availability provisions for Hyper-V and Windows Server VMs, such as network load balancing, live migration, and storage migration. The module also covers high availability options for shares hosted on Windows Server file servers. Finally, the module describes how to implement scaling for virtual machine scale sets and load-balanced VMs, and how to implement Azure Site Recovery. Lessons for module 3 Introduction to Cluster Shared Volumes. Implement Windows Server failover clustering. Implement high availability of Windows Server VMs. Implement Windows Server File Server high availability. Implement scale and high availability with Windows Server VMs. Lab : Implementing failover clustering Configuring iSCSI storage Configuring a failover cluster Deploying and configuring a highly available file server Validating the deployment of the highly available file server After completing module 3, students will be able to: Implement highly available storage volumes by using Clustered Share Volumes. Implement highly available Windows Server workloads using failover clustering. Describe Hyper-V VMs load balancing. Implement Hyper-V VMs live migration and Hyper-V VMs storage migration. Describe Windows Server File Server high availablity options. Implement scaling for virtual machine scale sets and load-balanced VMs. Implement Azure Site Recovery. Module 4: Disaster recovery in Windows Server This module introduces Hyper-V Replica as a business continuity and disaster recovery solution for a virtual environment. The module discusses Hyper-V Replica scenarios and use cases, and prerequisites to use it. The module also discusses how to implement Azure Site Recovery in on-premises scenarios to recover from disasters. Lessons for module 4 Implement Hyper-V Replica Protect your on-premises infrastructure from disasters with Azure Site Recovery Lab : Implementing Hyper-V Replica and Windows Server Backup Implementing Hyper-V Replica Implementing backup and restore with Windows Server Backup After completing module 4, students will be able to: Describe Hyper-V Replica, pre-requisites for its use, and its high-level architecture and components Describe Hyper-V Replica use cases and security considerations. Configure Hyper-V Replica settings, health monitoring, and failover options. Describe extended replication. Replicate, failover, and failback virtual machines and physical servers with Azure Site Recovery. Module 5: Implementing recovery services in hybrid scenarios This module covers tools and technologies for implementing disaster recovery in hybrid scenarios, whereas the previous module focus on BCDR solutions for on-premises scenarios. The module begins with Azure Backup as a service to protect files and folders before highlighting how to implementRecovery Vaults and Azure Backup Policies. The module describes how to recover Windows IaaS virtual machines, perform backup and restore of on-premises workloads, and manage Azure VM backups. The modules also covers how to provide disaster recovery for Azure infrastructure by managing and orchestrating replication, failover, and failback of Azure virtual machines with Azure Site Recovery. Lessons for module 5 Implement hybrid backup and recovery with Windows Server IaaS Protect your Azure infrastructure with Azure Site Recovery Protect your virtual machines by using Azure Backup Lab : Implementing Azure-based recovery services Implementing the lab environment Creating and configuring an Azure Site Recovery vault Implementing Hyper-V VM protection by using Azure Site Recovery vault Implementing Azure Backup After completing module 5, students will be able to: Recover Windows Server IaaS virtual machines by using Azure Backup. Use Azure Backup to help protect the data for on-premises servers and virtualized workloads. Implement Recovery Vaults and Azure Backup policies. Protect Azure VMs with Azure Site Recovery. Run a disaster recovery drill to validate protection. Failover and failback Azure virtual machines. Module 6: Upgrade and migrate in Windows Server This module discusses approaches to migrating Windows Server workloads running in earlier versions of Windows Server to more current versions. The module covers the necessary strategies needed to move domain controllers to Windows Server 2022 and describes how the Active Directory Migration Tool can consolidate domains within a forest or migrate domains to a new AD DS forest. The module also discusses the use of Storage Migration Service to migrate files and files shares from existing file servers to new servers running Windows Server 2022. Finally, the module covers how to install and use the Windows Server Migration Tools cmdlets to migrate commonly used server roles from earlier versions of Windows Server. Lessons for module 6 Active Directory Domain Services migration Migrate file server workloads using Storage Migration Service Migrate Windows Server roles Lab : Migrating Windows Server workloads to IaaS VMs Deploying AD DS domain controllers in Azure Migrating file server shares by using Storage Migration Service After completing module 6, students will be able to: Compare upgrading an AD DS forest and migrating to a new AD DS forest. Describe the Active Directory Migration Tool (ADMT). Identify the requirements and considerations for using Storage Migration Service. Describe how to migrate a server with storage migration. Use the Windows Server Migration Tools to migrate specific Windows Server roles. Module 7: Implementing migration in hybrid scenarios This module discusses approaches to migrating workloads running in Windows Server to an infrastructure as a service (IaaS) virtual machine. The module introduces using Azure Migrate to assess and migrate on-premises Windows Server instances to Microsoft Azure. The module also covers how migrate a workload running in Windows Server to an infrastructure as a service (IaaS) virtual machine (VM) and to Windows Server 2022 by using Windows Server migration tools or the Storage Migration Service. Finally, this module describes how to use the Azure Migrate App Containerization tool to containerize and migrate ASP.NET applications to Azure App Service. Lessons for module 7 Migrate on-premises Windows Server instances to Azure IaaS virtual machines Upgrade and migrate Windows Server IaaS virtual machines Containerize and migrate ASP.NET applications to Azure App Service Lab : Migrating on-premises VMs servers to IaaS VMs Implementing assessment and discovery of Hyper-V VMs using Azure Migrate Implementing migration of Hyper-V workloads using Azure Migrate After completing module 7, students will be able to: Plan a migration strategy and choose the appropriate migration tools. Perform server assessment and discovery using Azure Migrate. Migrate Windows Server workloads to Azure VM workloads using Azure Migrate. Explain how to migrate workloads using Windows Server Migration tools. Migrate file servers by using the Storage Migration Service. Discover and containerize ASP.NET applcations running on Windows. Migrate a containerized application to Azure App Service. Module 8: Server and performance monitoring in Windows Server This module introduces a range of tools to monitor the operating system and applications on a Windows Server computer as well as describing how to configure a system to optimize efficiency and to troublshoot problems. The module covers how Event Viewer provides a convenient and accessible location for observing events that occur, and how to interpret the data in the event log. The module also covers how to audit and diagnose a Windows Server environment for regulatory compliance, user activity, and troubleshooting. Finally, the module explains how to troubleshoot AD DS service failures or degraded performance, including recovery of deleted objects and the AD DS database, and how to troubleshoot hybrid authentication issues. Lessons for module 8 Monitor Windows Server performance Manage and monitor Windows Server event logs Implement Windows Server auditing and diagnostics Troubleshoot Active Directory Lab : Monitoring and troubleshooting Windows Server Establishing a performance baseline Identifying the source of a performance problem Viewing and configuring centralized event logs After completing module 8, students will be able to: Explain the fundamentals of server performance tuning. Use built-in tools in Windows Server to monitor server performance. Use Server Manager and Windows Admin Center to review event logs. Implement custom views. Configure an event subscription. Audit Windows Server events. Configure Windows Server to record diagnostic information. Recover the AD DS database and objects in AD DS. Troubleshoot AD DS replication. Troubleshoot hybrid authentication issues. Module 9: Implementing operational monitoring in hybrid scenarios This module covers using monitoring and troubleshooing tools, processes, and best practices to streamline app performance and availabilty of Windows Server IaaS VMs and hybrid instances. The module describes how to implement Azure Monitor for IaaS VMs in Azure, implement Azure Monitor in on-premises environments, and use dependency maps. The module then explains how to enable diagnostics to get data about a VM, and how to view VM metrics in Azure Metrics Explorer, and how to create a metric alert to monitor VM performance. The module then covers how to monitor VM performance by using Azure Monitor VM Insights. The module then describes various aspects of troubleshooting on premises and hybrid network connectivity, including how to diagnose common issues with DHCP, name resolution, IP configuration, and routing. Finally, the module examines how to troubleshoot configuration issues that impact connectivity to Azure-hosted Windows Server virtual machines (VMs), as well as approaches to resolve issues with VM startup, extensions, performance, storage, and encryption. Lessons for module 9 Monitor Windows Server IaaS Virtual Machines and hybrid instances Monitor the health of your Azure virtual machines by using Azure Metrics Explorer and metric alerts Monitor performance of virtual machines by using Azure Monitor VM Insights Troubleshoot on-premises and hybrid networking Troubleshoot Windows Server Virtual Machines in Azure Lab : Monitoring and troubleshooting of IaaS VMs running Windows Server Enabling Azure Monitor for virtual machines Setting up a VM with boot diagnostics Setting up a Log Analytics workspace and Azure Monitor VM Insights After completing module 9, students will be able to: Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. Implement Azure Monitor for IaaS VMs in Azure and in on-premises environments. View VM metrics in Azure Metrics Explorer. Use monitoring data to diagnose problems. Evaluate Azure Monitor Logs and configure Azure Monitor VM Insights. Configure a Log Analytics workspace. Troubleshoot on-premises connectivity and hybrid network connectivity. Troubleshoot AD DS service failures or degraded performance. Recover deleted security objects and the AD DS database. Troubleshoot hybrid authentication issues. [-]
Les mer
Virtuelt klasserom 5 dager 28 500 kr
This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions... [+]
Agenda Module 1: Creating Azure App Service Web Apps -Azure App Service core concepts-Creating an Azure App Service Web App-Configuring and Monitoring App Service apps-Scaling App Service apps-Azure App Service staging environments Module 2: Implement Azure functions -Azure Functions overview-Developing Azure Functions-Implement Durable Functions Module 3: Develop solutions that use blob storage -Azure Blob storage core concepts-Managing the Azure Blob storage lifecycle-Working with Azure Blob storage Module 4: Develop solutions that use Cosmos DB storage -Azure Cosmos DB overview-Azure Cosmos DB data structure-Working with Azure Cosmos DB resources and data Module 5: Implement IaaS solutions -Provisioning VMs in Azure-Create and deploy ARM templates-Create container images for solutions-Publish a container image to Azure Container Registry-Create and run container images in Azure Container Instances Module 6: Implement user authentication and authorization -Microsoft Identity Platform v2.0-Authentication using the Microsoft Authentication Library-Using Microsoft Graph-Authorizing data operations in Azure Storage Module 7: Implement secure cloud solutions -Manage keys, secrets, and certificates by using the KeyVault API-Implement Managed Identities for Azure resources-Secure app configuration data by using Azure App Configuration Module 8: Implement API Management -API Management overview-Defining policies for APIs-Securing your APIs Module 9: Develop App Service Logic Apps -Azure Logic Apps overview-Creating custom connectors for Logic Apps Module 10: Develop event-based solutions -Implement solutions that use Azure Event Grid-Implement solutions that use Azure Event Hubs-Implement solutions that use Azure Notification Hubs Module 11: Develop message-based solutions -Implement solutions that use Azure Service Bus-Implement solutions that use Azure Queue Storage queues Module 12: Monitor and optimize Azure solutions -Overview of monitoring in Azure-Instrument an app for monitoring-Analyzing and troubleshooting apps-Implement code that handles transient faults Module 13: Integrate caching and content delivery within solutions -Develop for Azure Cache for Redis-Develop for storage on CDNs [-]
Les mer
Klasserom + nettkurs 5 dager 31 000 kr
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availabili... [+]
COURSE OVERVIEW  You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway.  This course includes an exam. TARGET AUDIENCE Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. COURSE OBJECTIVES  Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components COURSE CONTENT Module 1: Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Module 2: Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists Module 3: ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX Module 4: High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Module 5: Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting Module 6: SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Module 7: Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Module 8: Monitoring and Troubleshooting Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Module 9: Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments Module 10: AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Module 11: Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Module 12: Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Module 13: Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Module 14: Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA [-]
Les mer
Bedriftsintern 2 dager 13 500 kr
In this Workshop, we will use the current versions of Spring Boot, Spring Framework and Project Reactor to write Reactive code and will introduce RSocket, an application ... [+]
You’ll get hands-on experience with building a Reactive application to stream data leveraging the newly available Reactive data types, Spring WebFlux, Spring Data and Rsocket. Besides that, we will work with some new tools which make dealing with errors and blocking APIs visible. Agenda Introduction Reactive Streams, Publisher/Subscriber types and Reactor types Getting familiar with Project Reactor Using Reactive RabbitMQ with Spring Using Rsocket as a streaming message protocol Using Spring WebFlux Functional configuration API for Spring WebFlux Using Reactive Types with Thymeleaf Using Spring Security Reactive Using Spring Data MongoDB to reactively stream data Using Spring Data R2DBC Using Reactive Redis with Spring What’s next?  Target audience This workshop is targeted at developers and architects who are new to reactive programming and want to learn how to use the Spring ecosystem to get started. Requierments Participants should have some prior knowledge about Java and the Spring Framework/Ecosystem. The workshop will be held in English. In order to participate, you will need: A laptop with at enough spare disk space and RAM Java, Maven and your favourite IDE installed (Eclipse, Spring STS, IntelliJ, Netbeans) Docker for some demos [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
OFFICIAL (ISC)2 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL TRAINING - INCLUDING EXAM [+]
COURSE OVERVIEW The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the cybersecurity market. CISSP validates a cybersecurity professional’s deep technical and managerial knowledge and experience to effectively design, engineer and manage an organization’s overall security posture. Please note an exam voucher is included as part of this course TARGET AUDIENCE Cybersecurity professionals with at least 5 years in the information security field. Member data has shown that amajority of CISSP holders are in middle management and a much smaller proportion are in senior or junior/entry-level positions. Roles include:• Chief Information Officer• Chief Information Security Officer• Chief Technology Officer• Compliance Manager / Officer• Director of Security• Information Architect• Information Manager / Information RiskManager or Consultant• IT Specialist / Director / Manager• Network / System Administrator• Security Administrator• Security Architect / Security Analyst• Security Consultant• Security Manager• Security Systems Engineer / Security EngineerSectorsCISSP is relevant across all sectors and industries, including:• Aerospace• Automotive• Banking, financial services, insurance (BFSI)• Construction• Cybersecurity• Energy• Engineering• Government• Healthcare, IT products, services, consulting• Manufacturing• Pharma• Retail• Telecom COURSE OBJECTIVESAfter completing this course you should be able to: Understand and apply fundamental concepts and methods related to the fields of information technology and security Align overall organizational operational goals with security functions and implementations. Understand how to protect assets of the organization as they go through their lifecycle. Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability. Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures. Understand the importance of cryptography and the security services it can provide in today’s digital and information age. Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections. Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function. List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7. Identify standard terms for applying physical and logical access controls to environments related to their security practice. Appraise various access control models to meet business security requirements. Name primary methods for designing and validating test and audit strategies that support business requirements. Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures. Recognize risks to an organization’s operational endeavours and assess specific threats, vulnerabilities and controls. Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it; identify which security control(s) are appropriate for the development environment; and assess the effectiveness of software security. COURSE CONTENT Domain 1: Security and Risk Management Domain 2: Asset Security Domain 3: Security Architecture and Engineering Domain 4: Communication and Network Security Domain 5: Identity and Access Management (IAM) Domain 6: Security Assessment and Testing Domain 7: Security Operations Domain 8: Software Development Security TEST CERTIFICATION Recommended as preparation for the following exam: (ISC)2 Certified Information Systems Security Professional Gaining this accreditation is not just about passing the exam, there are a number of other criteria that need to be met including 5 years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK . Full details can be found at https://www.isc2.org/cissp/default.aspx Those without the required experience can take the exam to become an Associate of (ISC)²  while working towards the experience needed for full certification Please note an exam voucher is included as part of this course   [-]
Les mer
Nettkurs 2 timer 1 990 kr
PowerPoint webinar for deg som skal lage eller endre organisasjonens PowerPoint-maler. Profesjonelt utformede maler er et viktig utgangspunkt for å lage profesjonelle pr.... [+]
Instruktørbasert opplæring:   PowerPoint nivå 4 - Utvikling av maler Lysbildemal Generelt om maloppsettet Flere lysbildemaler i samme presentasjon Definere temafarger Bytte lysbildemal i en presentasjon Gjøre maler tilgjengelig for "alle" Lysbildeoppsett Tilpasse eksisterende oppsett Lage egendefinerte lysbildeoppsett Kontrollere rekkefølgen på plassholdere   3 gode grunner til å delta 1. Få forståelse av hvordan malen fungerer 2. Lær hvordan temafarger styrer utseende 3. Se hvordan du kan tilpasse lysbildeoppsett, og hvordan lage egne [-]
Les mer
Virtuelt klasserom 3 timer 1 200 kr
Microsoft 365 er abonnement på Office-programmer og andre produktivitetstjenester som du får tilgang til via Internett (skytjenester). [+]
Microsoft 365 er abonnement på Office-programmer og andre produktivitetstjenester som du får tilgang til via Internett (skytjenester). Tidligere var dette kjent under navnet Office 365, men Microsoft har nå endret navnet til Microsoft 365. Fordelen er at du alltid har tilgang til Office-programmer og dine dokumenter, og kan dele dem med andre fra hvilken som helst enhet. Dette betyr at du har tilgang på dine dokumenter og verktøy via PC, mobil eller nettbrett. På kurset vil du lære om samhandling, kommunikasjon og tilgjengelighet. Om Microsoft 365Microsoft 365 er abonnement på Office-programmer og andre produktivitetstjenester som du får tilgang til via Internett (skytjenester). I abonnementet har du tilgang på en rekke applikasjoner, slik som Word, Excel, PowerPoint, Teams og lagring i OneDrive, samt mange andre nyttige verktøy. Fordelen er at du alltid har tilgang til Office-programmer og dine dokumenter, og kan dele dem med andre fra hvilken som helst enhet. Vi viser deg hvordan du kan jobbe effektivt med ditt Microsoft 365 abonnement. Pris: 1200 kroner Ansatte ved UiS har egne prisbetingelser.   Etter at du har meldt deg på webinaret, vil du få tilsendt praktisk informasjon om pålogging. Webinarene gjennomføres fra din PC eller nettbrett.    [-]
Les mer
Virtuelt eller personlig Bærum 4 dager 14 450 kr
03 Jun
Kurset er rettet mot personer som skal konstruere VVS-anlegg i 3D. [+]
  Fleksible kurs for fremtidenNy kunnskap skal gi umiddelbar effekt, og samtidig være holdbar og bærekraftig på lang sikt. NTI AS har 30 års erfaring innen kurs og kompetanseheving, og utdanner årlig rundt 10.000 personer i Nord Europa innen CAD, BIM, industri, design og konstruksjon.   Revit MEP MagiCAD VVS grunnkurs Her er et utvalg av temaene du vil lære på kurset Grunnleggende innføring i Revit Håndtering av Views, etasjer, manøvering i modell, visningsalternativer, redigeringsfunksjoner. Etablering av prosjekt. Linke modeller, sette opp etasjer og Views Prosjektering av ventilasjonsanlegg, varme- og forbruksvannsystem og avløpssystem IFC-eksport Utsparinger Etter kurset kan du bruke grunnleggende funksjoner i Autodesk Revit MEP og MagiCAD for Revit med fokus på å sette opp, importere og linke prosjekter, konstruere VVS-installasjoner, samt dokumentasjon. Lære å utforme en VVS-modell slik at mest mulig informasjon kan utnyttes med hensyn til BIM.   Dette er et populært kurs, meld deg på nå!   Tilpassete kurs for bedrifterVi vil at kundene våre skal være best på det de gjør - hele tiden.  Derfor tenker vi langsiktig om kompetanseutvikling og ser regelmessig kunnskapsløft som en naturlig del av en virksomhet. Vårt kurskonsept bygger på et moderne sett av ulike læringsmiljøer, som gjør det enkelt å finne riktig løsning uansett behov. Ta kontakt med oss på telefon 483 12 300, epost: salg@nticad.no eller les mer på www.nticad.no [-]
Les mer
Nettstudie 1 semester 4 980 kr
På forespørsel
Intranett og intranett-teknologi; Tjenesteinnhold i lokale informasjonssystemer; Sikkerhet i informasjonstjenester; Bedriftsopplæring; [+]
  Studieår: 2013-2014   Gjennomføring: Høst Antall studiepoeng: 5.0 Forutsetninger: IINI1001 IT Introduksjon eller tilsvarende forhåndskunnskaper. Innleveringer: Et større prosjektarbeid som gjennomføres som gruppearbeid. Personlig veileder: ja Vurderingsform: Vurderingen i faget er basert på prosjektarbeidet. Prosjektene gjennomføres gruppevis. Individuelle karakterer kan gis ved manglende deltakelse eller ved kontraktsbrudd med øvrige medlemmer. Ansvarlig: Thor O. Olsen         Læremål: Etter å ha gjennomført emnet «Lokale informasjonstjenester» skal studenten ha følgende samlete læringsutbytte: KUNNSKAPER:Kandidaten:- kjenner til ulike typer informasjon som brukes i bedrifter og organisasjoner- har kunnskap om hvordan datateknologi og nettløsninger kan brukes i bedriftens forvaltning av informasjon- har kunnskap om moderne former for intern opplæring og oppbevaring og tilgjengelighet av kunnskapskapital FERDIGHETER:Kandidaten:- kan se behov for og være pådriver for små og mellomstore informasjonsløsninger for intern informasjon- kan komme med anbefalinger for bruk av moderne IT-kommunikasjonsløsninger - kan både individuelt og i grupper diskutere og redegjøre for holdninger og standpunkter i forhold til informasjonsforvaltning og ivaretakelse av virksomheters kunnskapskapital GENERELL KOMPETANSE:Kandidaten:- har forståelse for betydningen av aktiv informasjons- og kunnskapsforvaltning.- kan delta i planlegging og gjennomføring av informasjonshåndteringsprosjekter- kan identifisere, planlegge og gjennomføre en selvstendig oppgave i samarbeid med andre Innhold:Intranett og intranett-teknologi; Tjenesteinnhold i lokale informasjonssystemer; Sikkerhet i informasjonstjenester; Bedriftsopplæring;Les mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Dette faget går: Høst 2013    Fag Lokale informasjonstjenester 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Nettkurs 25 timer 3 750 kr
Stadig flere bedrifter har behov for folk med kunnskaper om data og databehandling. Kan du dokumentere at du har slik kunnskap? Kurset MS Office 2016 - 4 Moduler tar for... [+]
Stadig flere bedrifter har behov for folk med kunnskaper om data og databehandling. Kan du dokumentere at du har slik kunnskap? Mål med kurset: Deltakeren skal tilegne seg kunnskaper om de mest benyttede Windows programmene og etter avsluttet kurs kunne jobbe smartere og mer effektivt. Krav til forkunnskaper: Et innføringskurs i data eller noe erfaring med data fra før er nødvendig. Kurset MS Office 2016 - 4 Moduler tar for seg de mest brukte Windows programmene: Excel Word PowerPoint Windows 10 Gjennomføring:  Gjennomføres på Internett, interaktivt. Kurset inneholder tekst, bilder, videofremvisninger, små tester og en mengde oppgaver. Enkelt og fleksibelt. Kursdeltageren har on-line tilgang i 12 måneder fra man starter å ta kurset.  Dette gjør at man har tilstrekkelig tid til å tilegne seg nødvendige kunnskaper. [-]
Les mer